Earlier this week HRC released MILPER message 18-144 which announced the schedule for the FY19 Warrant Officer Selection Board.
Today marked several historic events for the Department of Defense. In the course of a couple of hours, three big events happened.
So this morning I was listening to the radio on the drive into work when the DJ made an interesting statement. Turns out….he was right. Today marks the 40th anniversary of the very first spam message.
Back in November I had the chance to attend the Splunk .conf conference here in DC. One of the big after hours events of the conference is the Boss of the SOC (BOTS) competition that puts teams against each other to try and analyze a set of data to identify a variety of indicators of compromise from an incident. After a little bit of talking, Splunk decided to release the BOTS app as an open-source project.
Here is another CTF problem from last years Army Cyber Stakes Challenge. You are provided a solid line of characters (see below) and have to turn it into the flag. The trick is that because there aren’t any line breaks, you have to figure it out.
On Wednesday the Army released MILPER message 18-126 announcing the FY19 Signal Regiment Officer Programs. The programs are open to all 25 branch and FA 26 branch officers as well as 255 warrants and is designed to offer broadening opportunities for Signal officers.
Another problem from ACSC5. You’ve been able to get on a router and capture some traffic in an effort to map out the the corporate network. Your intelligence team has told you that your target device has an IP address of 172.16.58.47 but no one knows that actual location of it. Examine the network traffic and see if you can figure out the location of that device.
I frequently write BASH scripts for use at work. I am a firm believer that if I am going to do something more than once or twice, script the stupid thing out. When possible, I’m a big fan of using command line arguments when I write scripts just to make things easier and also allow even more scripting, but I always forget how the hell to handle the things…..No more.
For anyone who doesn’t know, Mandiant is large cyber security company that was bought by Fireeye. They grabbed a lot of attention by the cyber security community when in 2013, they publicly released a report that linked the Chinese military to attacks dating back to at least 2006 on over 141 organizations. Each year they release a report on cyber security trends that they observed during the previous year. Granted, the results are screwed because they are based only on incidents that they responded to, but they at least give a good overall picture of what is going on around the world.
Yet another problem from ACSC5. Really not much of a clue needed, find the flag